Offsite Links

Course Description

Investigation and Triage

The student becomes familiar with the practical methodologies of digital forensics in this course. We discuss real world cases in the exciting, burgeoning field, such as digital forensics triage, investigations, and the prominent techniques and tools deployed in the profession.

Windows Digital Forensics

This example-driven course instructs the student to build a skillset in order to perform digital forensics examinations in the Windows environment. The core skills necessary to perform forensic analysis of digital data will be covered. We will learn how to acquire and analyze data from a Windows system. Many digital forensics tools and techniques will be used in this course.

Windows Registry Forensics

In this course, the student is guided through advanced forensic investigations of the Windows Registry system. From the Registry’s background to its basic topics—e.g., hive files, information in keys and values—to discovering the trove of available data, the learner will be prepared to prove that a specific user performed specific actions in a Windows platform.

Digital Forensics Tools and Techniques

Learn about up-to-date free and open-source digital forensics tools. In this course, the learner not only gains experience using digital forensics tools but also will understand the “why” behind the “how” when analyzing a Windows system. The course includes lessons about data acquisition and analysis of USB devices, a key topic in digital forensics especially useful in workplace cases of the bring-your-own-device (“BYOD”) nature that are on the rise.

Digital Forensics Evidence

When a civil or criminal case may end up in court, all of the digital forensics skills that IT professionals bear are at risk unless chain-of-custody is maintained and the rules of evidence are followed. Understanding evidence law, therefore, prepares the information security professional to put into full force digital forensics analyses and effectively serve the corporate, private, or governmental client with utmost professionalism. MSDF 640 Laws, Regulations, Investigations, and Compliance and this course complement each other to place the learner at a great competitive advantage over peers who tend to leave the law to the lawyers.

Malware Analysis and Mitigation

This course focuses on malware in Windows environments. The student will understand the various techniques used to analyze different types of malware programs such as Trojan horses, botnets, and rootkits. This course provides the student with useful tools to perform digital forensics focused on analyzing and mitigating malware.

INFOSEC Leadership and Communications

Without effective and efficient leadership in the security domain, both informational and physical, all of the analyses may be for naught. In this unique course, the student will gain an advantage among professional peers by becoming an excellent communicator, and developing leadership skills. Technology professionals require both technological toolkits and “soft skills” abilities in order to inform and support law enforcement, executives, and similar lay-stakeholders. The ability to translate jargon into concise, actionable business actions results in added value.

Web Browser Forensics

In this unique course, the student will be provided with the knowledge, skills, and abilities to comprehensively understand web browser vulnerabilities. The approach taken includes becoming aware of browser-based risk by embracing tutorials designed by experienced browser hackers. Through this perspective, you will learn how hackers target Internet Explorer, Chrome, and Firefox web browsers, and therefore how to fight back against such attacks.

Digital Forensics Capstone (1hr)

The proverbial rubber hits the road in this practical course where the student applies the knowledge and tools attained and obtained through successful completion of at least seven MSDF courses. While the student will likely be concurrently taking up to two other MSDF courses he or she will work with an assigned faculty member(s) to design a cybersecurity incident, draft and implement a response plan, acquire and analyze relevant data, and report the results in a mock attorney meeting with the goal of having the case picked up for prosecution.

Clicking the “Send Request” button below constitutes your express written consent to be called and/or texted by University of the Cumberlands at the number(s) you provided, regarding furthering your education. You understand that these calls may be generated using an automated technology.

Comments:Website URL:

A Quality Education

Our accredited online programs are designed to accommodate adult learners who want to advance their education without compromising quality. Our online programs offer the same curriculum as on-campus equivalents, but are flexible enough to fit into your busy schedule.